Sciweavers

1402 search results - page 32 / 281
» Personalized privacy preservation
Sort
View
ICDE
2006
IEEE
275views Database» more  ICDE 2006»
15 years 11 months ago
Privacy Preserving Query Processing Using Third Parties
Data integration from multiple autonomous data sources has emerged as an important practical problem. The key requirement for such data integration is that owners of such data nee...
Amr El Abbadi, Aziz Gulbeden, Divyakant Agrawal, F...
HICSS
2009
IEEE
144views Biometrics» more  HICSS 2009»
15 years 4 months ago
Privacy Preserving Decision Tree Mining from Perturbed Data
Privacy preserving data mining has been investigated extensively. The previous works mainly fall into two categories, perturbation and randomization based approaches and secure mu...
Li Liu, Murat Kantarcioglu, Bhavani M. Thuraisingh...
IPTPS
2004
Springer
15 years 2 months ago
Friends Troubleshooting Network: Towards Privacy-Preserving, Automatic Troubleshooting
Abstract— Content sharing is a popular usage of peerto-peer systems for its inherent scalability and low cost of maintenance. In this paper, we leverage this nature of peer-to-pe...
Helen J. Wang, Yih-Chun Hu, Chun Yuan, Zheng Zhang...
FSKD
2008
Springer
136views Fuzzy Logic» more  FSKD 2008»
14 years 10 months ago
k-Anonymity via Clustering Domain Knowledge for Privacy Preservation
Preservation of privacy in micro-data release is a challenging task in data mining. The k-anonymity method has attracted much attention of researchers. Quasiidentifier is a key co...
Taiyong Li, Changjie Tang, Jiang Wu, Qian Luo, She...
INFOCOM
2011
IEEE
14 years 1 months ago
A distributed and privacy preserving algorithm for identifying information hubs in social networks
—This paper addresses the problem of identifying the top-k information hubs in a social network. Identifying topk information hubs is crucial for many applications such as advert...
Muhammad Usman Ilyas, Muhammad Zubair Shafiq, Alex...